EP0029894A2 - System zur sicheren Kennwortverifikation - Google Patents
System zur sicheren Kennwortverifikation Download PDFInfo
- Publication number
- EP0029894A2 EP0029894A2 EP80106085A EP80106085A EP0029894A2 EP 0029894 A2 EP0029894 A2 EP 0029894A2 EP 80106085 A EP80106085 A EP 80106085A EP 80106085 A EP80106085 A EP 80106085A EP 0029894 A2 EP0029894 A2 EP 0029894A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- card
- key
- terminal
- encryption
- keyboard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title description 3
- 101000798275 Xenopus laevis Serine/threonine-protein kinase atr Proteins 0.000 claims abstract description 44
- 238000012546 transfer Methods 0.000 claims abstract description 9
- 230000008878 coupling Effects 0.000 claims abstract description 5
- 238000010168 coupling process Methods 0.000 claims abstract description 5
- 238000005859 coupling reaction Methods 0.000 claims abstract description 5
- 238000003860 storage Methods 0.000 claims description 14
- 230000006870 function Effects 0.000 description 13
- 238000004891 communication Methods 0.000 description 8
- 230000004075 alteration Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 238000000034 method Methods 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000001939 inductive effect Effects 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0873—Details of the card reader
- G07F7/088—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself
- G07F7/0886—Details of the card reader the card reader being part of the point of sale [POS] terminal or electronic cash register [ECR] itself the card reader being portable for interacting with a POS or ECR in realizing a payment transaction
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
Definitions
- the present invention addresses what is sometimes referred to as the "card-person pairing problem".
- This problem exists whenever a person presents any sort of card or token, such as a credit card, debit card, identification card, etc. to another entity such as a retailer, bank, access control station, computer access terminal, etc., as evidence of the right or privilege of the person presenting said card to enter into some sort of privileged relationship relative to said entity such as credit, goods, services, facility access, etc.
- the question which must be satisfactorily answered is, "Is the person presenting the card or token the person who is entitled to have same?".
- the problem to be solved is one of adequately identifying the person, based on information contained in the card. From this information the entity seeking to verify the identity of the person must determine that said identity is correct.
- recognition means such as "voiceprint”, or "fingerprint”. These are recognition and identification schemes wherein a person's fingerprint or voiceprint is compared against a previously taken fingerprint or voiceprint which is stored either on a credit card-like device carried by the person or stored in a central system memory, depending upon the complexity of the comparison and other factors which will be well understood by those skilled in the art.
- the present invention presents a system in which the valid possession of a personal identification card is established when the person provides a key which is identical to a key which is electronically stored in the card.
- the card itself is similar to that described in U.S. Patent No. 3,806,874 of Kurt Ehrat, entitled "Identification System for Individuals".
- An essential feature of such a card is that it be so constructed that it is virtually impossible for anyone to either alter the circuitry in the card or to in any way either detect or alter the informational content of said card and circuitry other than in a manner which is intended by the design of the card.
- CARD The credit card-like device or token
- a CARD The credit card-like device or token
- Such a CARD could be utilized at a bank's cash issuing terminal, a teller operated terminal, a point of sale terminal in a department store, or an identification terminal located at a physical facility.
- U/I Terminal The terminals to which such a CARD is to be presented will be referred to hereinafter as a Utilization/Identification Terminal or "U/I Terminal". Regardless of the ultimate utilization of the terminal, for the purpose of the present invention, identification of the person is the function with which the present invention is concerned.
- the person holding the CARD enter a memorized number via a keyboard into the identification system.
- This number is then utilized as an encryption key as will be understood from the following description. While the number is, in essence, a personal identification number or PIN, in view of the use of the number in the present system, it will be referred to herein as the asserted key.
- This asserted key is in contrast with a true key permanently stored in the CARD.
- the asserted key is memorized and must be entered by the person into the U/I Terminal.
- the key stored in the CARD will be referred to subsequently as the true key.
- the asserted key and the true key will be specifically called "the key K A " and "the key K T " respectively.
- a personal portable terminal device is utilized by the person to interface between the CARD and U/I Terminal.
- the personal portable terminal device performs both an interface function between the CARD and the U/I Terminal and also provides a keyboard for entering the key K A into the system.
- the term "XATR" will be utilized to refer to such terminal.
- the CARD is first placed in a XATR which is then placed in a data exchange relationship with a U/I Terminal such as a Point of Sale Terminal (POST), or the like, at the facility where the person wishes to establish his identity.
- a U/I Terminal such as a Point of Sale Terminal (POST), or the like
- POST Point of Sale Terminal
- the XATR is provided with a keyboard which allows the person to enter his memorized key K into the system with minimum exposure to unauthorized copying or retention.
- a XATR is disclosed in detail in copending application Serial No. 866,197 of the present inventor entitled, "Personal Portable Terminal for Financial Transactions" filed December 30, 1977.
- an identification system including a unqiue CARD containing data storage and computational capabilities built into same.
- the card is further characterized by the fact that neither the circuitry nor any data stored therein be susceptible to alteration or unauthorized access subsequent to the manufacture or issuance thereof.
- Embedded in the CARD are a plurality of storage registers, a random word generator and at least one key-controlled block-cipher encryption device.
- the bank or other entity issuing the CARD causes the person's true key K T to be stored within the CARD. The person memorizes this key for subsequent entry into a U/I Terminal, or a XATR as the key K A .
- a random word is produced by the system, which random word is simultaneously encrypted under the key, KT, and the key, K A , entered at a keyboard by the person.
- the results of the encryptions of this random word are subsequently compared to determine if the two keys are the same. If they are, the person presenting the card is considered to be properly identified.
- the true key, K T permanently stored within the CARD is never available outside of the CARD, i.e., only the random word encrypted under K T is available outside of the CARD.
- the keyboard entered key, K A is not available to the U/I Terminal, only the random word encrypted under said key is.
- a personal identification system which includes the combination of a CARD which is issued to a person and a U/I Terminal.
- the CARD is so constructed that access to secure data stored therein is impossible. Any alteration of the functional operation of the circuitry contained therein subsequent to manufacture or issuance is also prevented.
- the CARD contains at least a secure storage means for a key K T unique to the person, means for generat- i n g or obtaining a random word to be encrypted under said key, K T , a key-controlled block-cipher encryption device, and means for transferring the encrypted random word to a U/I Terminal for subsequent comparison.
- the U/I Terminal provided at the utilization entity includes the following functional components:
- the operation of the present system includes the generation of a random word either in the CARD, the U/I Terminal, or by a combination of the two, and then separate encryptions of this random word under the two keys, K T and K A .
- the key, K T is stored in a secure storage location in the CARD and the key, K A , is entered by the person at a keyboard which may be located in the U/I Terminal.
- the two encryptions occur in identical encryption devices, the first being located in the CARD and the other in the U/I Terminal. If both keys are the same, the encrypted random words will be identical.
- the XATR in the present system provides a keyboard which is under the control of the person entering an asserted key K A .
- the XATR also serves as a communication, data, and control interface between the CARD and U/I Terminal.
- the circuit configuration of the CARD is modified so that the encryption of the random word under both the true key K T stored in the CARD and under the key K are both performed within the CARD.
- the two versions of the encrypted random word are both transferred to the U/I Terminal and to a comparison circuit located, therein, wherein an affirmative comparison indicates that the proper asserted key K A has been entered by the person.
- the person gains greater security because his asserted key K A never passes into the U/I Terminal.
- the utilization entity in order for the utilization entity to have adequate protection it should be understood that it is of greatest importance that the CARD carried by the individual be unalterable in data content, circuit function or data paths.
- the system would be compromised.
- means are provided for disabling the CARD in the event of an attempted unauthorized use should the card be lost or stolen.
- Circuitry is provided within the CARD to electronically disable the CARD in the event of one or more unsuccessful comparison operations. The number of comparison failures necessary to cause disabling of the CARD would be predetermined by the system designers. In this way a number of legitimate mistakes by a person entering his key K A would be permitted.
- FIGS. 1, 2 and 3 only the significant functional units of the system are disclosed. These are the significant storage registers and functional elements such as the encryption blocks, random word generators, and the comparison and catenation circuits.
- the gates for transmitting data between registers or between registers and functional units and their operation are considered obvious to a digital circuit designer.
- the sequential controls could comprise a system clock including a number of interconnected single shot circuits or a small microprocessor having an associated microprogrammed memory for effecting the various sequential operations required.
- control of the functional units within the CARD could either be accomplished by a microprocessor or a system clock physically located within the CARD wherein the operation is initiated by a single control pulse from the U/I Terminal or alternatively all of the control functions could be performed by a microprocessor located within the U/I Terminal and transmitted to the CARD via the interface between the Card and the Terminal.
- the XATR device functions primarily as a communication path for both data and control information.
- the required key length for the FIPS 'Data Encryption Standard' is 56 binary bits.
- Such a binary key is derived from a decimal keyboard entry by decimal to binary conversion employing conversion algorithms well-known in the art.
- a 'compare' in block 217 of the terminal would indicate that the person holding the CARD was a properly identified person.
- a 'no compare' would indicate that an unauthorized person was attempting to use the CARD or that the person's memorized key K A was improperly entered.
- communication between the CARD and the U/I Terminal could be by a number of means well-known in the art. These include direct connection, as indicated, inductive coupling, or the like. It is also assumed that the circuitry within the CARD would be powered inductively from a power source in the U/I Terminal, rendering the CARD less bulky. Similarly, the control sequences could be performed by either a series of sequential single shot circuits or by a small microprocessor and control store therefor which could be located either within the CARD or in the U/I Terminal and connected to the CARD via appropriate control lines as will be well-understood by those skilled in the art.
- the person first places his CARD on or in a U/I Terminal, which in the embodi- m ent of FIG. 1 is a retailer's Point of Sale Terminal (POST). Communication between the CARD and the U/I Terminal is established. First, the person enters his key K A via the keyboard 201 in the U/I Terminal. At this point all activity by the person ceases.
- POST Point of Sale Terminal
- the U/I Terminal through an appropriate signal, designated by the arrow P . I . (perform identification), initiates a program stored within the CARD to perform the following operations to establish the validity of the key K A entered by the person via the keyboard 201.
- the CARD delivers the contents of key storage register 1045, which is the true key K T to the key input of the encryption device 115
- the U/I Terminal delivers the keyboard entered key K A from the keyboard 201, as the asserted key input to the encryption device 215 (identical to 115).
- the CARD delivers a random word from the Random Word Generator 107 to one input of exclusive OR circuit 116 located on the CARD and to one input of the exclusive OR circuit 216 located in the U/I Terminal
- Random Word Generator 207 delivers random word RW2 simultaneously as the second input to exclusive OR circuit 116 in the card and to exclusive OR circuit 216 in the U/I Terminal.
- the two exclusive OR circuits 116 and 216 located on the CARD and in the U/I Terminal respectively, deliver the same composite random word to their respective encryption devices 115 and 215, as the data input.
- the two encryption operations are performed substantially simultaneously and the output of the encryption device 115 is stored in register 108 as the true encrypted random word (ERWT).
- the output from encryption device 215 is stored in register 208 as the asserted encrypted random word (ERWA).
- the two compare units simultaneously reach 'valid' or 'invalid' decisions based on ERWT and ERWA. If a 'valid' decision is reached, the person has entered the proper key K A at the keyboard and he is properly identified for whatever transaction he wished to consummate at the U/I Terminal.
- compare unit 117 The function of compare unit 117 is to activate disabling circuitry of the type shown in FIG. 3 which will be described later. It will be noted, however, that this is not a requirement of the most basic system.
- the output of encryption device 115 could be simultaneously transferred into compare unit 117 and 217 respectively, and the output of encryption device 215 could be simultaneously transferred to compare unit 217 and 117. Both of these alternate embodiments require that the CARD be absolutely unalterable to prevent the person fraudulently retransmitting ERWA back to the U/I Terminal and thus force a compare in compare unit 217. This subject will be discussed later with respect to the embodiment of FIG. 2.
- registers 108, 109 and 208, 209 could be dispensed with and the two encrypted random words ERWT and ERWA forwarded directly to the compare circuit 217, other changes could be made in the system without departing from the spirit and scope of the invention.
- Another possible alteration would be to dispense with the generation of the two random words RWl and RW2 and replace same with a single random word generator within the CARD or U/I Terminal which word is delivered to both encryption devices 115 and 215.
- FIG. 2 an alternative embodiment of the invention is disclosed wherein the person has a personal portable transaction device, or XATR, at his disposal which has means for interfacing with the CARD and with the U/I Terminal.
- the line A-A' again refers to the interface between the U/I Terminal and the XATR and CARD combination, i.e., the person and the Retailer.
- the XATR is indicated by the outer dashed line to the left of the interface line A-A' and the CARD and its circuitry are indicated.
- the XATR provides a keyboard 101 for entering the key K A which is totally within the control of the person presenting the CARD.
- the XA T R provides the communication or interface function between the CARD located therein and the U/I Terminal.
- the operations performed by the encryption circuitry, etc., in the embodiment of FIG. 2 are essentially the same as those of FIG. 1.
- the principal exception to this is that the distribution of functions between the CARD and U/I Terminal is different.
- the key K which is entered via the keyboard 101, never passes into the Terminal. Consequently, the second encryption device, shown in FIG. 2 as 114B, is located in the CARD. Again, the circuitry within the CARD may not be altered in any way by the person to whom said CARD is issued.
- the operation of the system is as follows. With the CARD in position in the XATR and the XATR appropriately connected to the U/I Terminal, a transaction initiation button is actuated. The person enters the key K into the keyboard 101 of the XATR. K A is communicated to the encryption device 114B as the key input. Simultaneously, the key K T stored in register 1045 is gated as the key input to the encryption device 114A.
- the data input to the two encryption units 114A and 114B both located on the CARD is generated by the Random Word Generator 106. Since both encryption devices are located on the CARD it is not necessary and serves no useful security function to have two random word generators as in the embodiment of FIG. 1.
- the outputs from the two encryption devices 114A and 114B are delivered to registers 108 in the CARD and 208 in the U/I Terminal as the true encrypted random word (ERWT) and asserted encrypted random word (ERWA), respectively.
- FIG. 2 prevents what would be a relatively simple alteration of the XATR by a person owning same and wishing to defraud the retailer.
- the person could cause the output from register 208 to be delivered directly to register 209.
- the compare circuit 217 would always give a successful comparison regardless ot what key K A the person entered at the keyboard 101.
- the contents of registers 208 and 209 are compared in unit 217 and if successful the identification of the person is assumed correct and if unsuccessful either a mistake has been made, i.e., the wrong key entered, or the person is an imposter.
- the numeral 1045 refers to the register for storing the true key, KT.
- register 108 stores the true encrypted random word and register 208 stores the asserted encrypted random word.
- FIG. 3 a system similar to FIG. 2 is disclosed utilizing again an XATR as an interface unit between the CARD and the U/I Terminal.
- FIG. 3 there are three additional enhancements to the basic system of the FIG. 2. It will be noted that the circuitry in FIG. 3 below the line D/D' is the same as in FIG. 2.
- the first enhancement of FIG. 3 is the use of a special counter having a "disable CARD” output which will electronically “destroy” or “disable” a CARD which should no longer be used. Its operation will be apparent from the subsequent description of the figure.
- the second feature described is the division of the key into high order and low order bits so that the key K A which must be memorized by the person may be considerably shortened.
- the third feature involves the use of a special index (M) which may be selectively entered by the individual into a register in the CARD. This index is an offset whereby the key entered at the keyboard may be periodically changed without necessitating any change of the permanently stored key K T .
- a block 125 is provided labeled Counter Protection having one output line labeled 'Disable CARD'.
- Two input lines are provided. The first is labeled "Increment” which emanates from register 104 where a quantity KL is stored. This line produces a pulse each time register 104 is accessed. The second input from the compare block 117 marked “Reset” resets this counter to zero. This prevents someone finding or stealing a card, placing it in a XATR, and trying different keys K A until the correct one is found.
- the counter protection circuit would be set at some predetermined count value.
- This count value or threshold would allow a reasonable number of honest mistakes on the part of the person entering his key K A .
- the register 104 is accessed and a pulse produced. Subsequently, with every successful compare between the registers 108 and 109 a pulse would be produced by 117 and the counter would be reset to zero. However, if a predetermined number of consecutive accesses of 104 should occur without a successful comparison by 117 a 'disable CARD' means 128 would be activated by the output from the Counter Protection block which would cause some "invalid" condition to occur in the CARD. This could take on a number of different forms such as, disabling the storage area for K T so it would not be available to the system.
- a special register could be provided which would be readable by the U/I Terminal indicating an invalid CARD wherein said register would always be read before any identification procedure began.
- Other ways in which the CARD could be disabled include setting a latch which burns a fusible link, removing power from the card or interrupting data flow from the CARD. This protection prevents an unauthorized holder of the CARD from presenting the CARD with different keys K A until the correct one is found.
- the second feature of the circuitry shown in FIG. 3 is the division of the asserted key K A so that a smaller number of digits must be memorized by the person.
- the blocks labeled 111, 102 and 103 should be ignored for the following explanation, it being assumed that the keyboard input goes directly to the catenation circuit 122 as the low order bits K A L.
- the true key K T is divided into two parts, the low order bits K T L being stored in register 104 and the high order bits K T H being stored in register 105.
- a low order portion of the key K T becomes one input to the catenation circuit 120 and the high order portion from register 105 becomes the second input to the catenation circuit 120.
- the catenation circuit functions to order these two groups of bits into their proper sequence, i.e., into a single key having the appropriate bits in the high and low order positions.
- Catenation circuit 122 works in exactly the same way as 120, and forms the full asserted key K A which is provided as the key input to the encryption device 114B.
- K T H is utilized to make up both the full true key K T and the full asserted key K A .
- security is provided and the size of the key which must be remembered and entered correctly via the keyboard 101 is reduced.
- a quantity M may be entered at any time by the individual and stored in register 103 via the dashed line from keyboard 101. Subsequently the asserted key which is entered via 101 referred to herein as K E is entered directly into register 102 in the normal fashion. Addition of the two quantities in registers 102 and 103 in the adder circuit 111 produces the partial asserted key K A L.
- both M and K E are N bit data words which when added together produce the N bit key K A L. This may be represented by the formula:
- This feature allows the person to periodically alter his asserted key K E to enhance security.
- the presently disclosed invention has applicability for any situation where personal identification is of importance. It would have particular utility in the retail sales field where the retailer is obviously concerned that the individual seeking credit and having an apparently valid credit card is actually the person entitled to said credit card and thus to credit. Another significant area of potential commercial utilization of the invention is in the financial field and more particularly cash issuing terminals either manned or unmanned wherein a person presents the bank ) CARD and, upon proper identification, cash is issued to the individual.
- the system also has potential utilization in the facility access field wherein an individual is either seeking entry into a physical facility such as a plant or to a computer or to computer files via a terminal where it is important that the individual be properly identified prior to the granting of the desired access.
- the function of the CARD is not limited to personal identification transactions, but may well be extended to maintain records of particular business transactions. Thus, subsequent bookkeeping and electronic funds transfer operations utilizing transaction data recorded on the card are possible.
- the CARD would be presented to a banking institution where the transaction data would be transferred to the person's account. In those cases where the transaction data was not previously forwarded to the bank by the U/I Terminal device, the CARD entered data would serve as the sole bookkeeping data input. Conversely, when the transaction data was previously forwarded to the bank the transaction data from the CARD could serve as a check to protect the person and warn him of any unauthorized use of his account or mistakes by the retailer.
- the presently disclosed system has the advantage of giving the person significant protection as well as providing security for the particular entity having control of the Utilization/ Identification Terminal whether it be a point of sale terminal, a computer terminal, a cash issuing terminal or some sort of facility access terminal.
- identification system disclosed herein could be combined with other personal identification systems for various high security applications. These might include signature verification systems, fingerprint recognition systems, voiceprint recognition systems and the like.
- the herein disclosed identification system provides a high degree of security for both the person holding the CARD and the entity which ultimately accepts said identification at a suitable U/I Terminal.
- the system maintains security without recourse to a Host computer which might be subject to breakdown, communication outages, etc., and thus is capable of off-host operation without sacrificing reliability.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US99797 | 1979-12-03 | ||
US06/099,797 US4295039A (en) | 1979-12-03 | 1979-12-03 | Method and apparatus for achieving secure password verification |
Publications (3)
Publication Number | Publication Date |
---|---|
EP0029894A2 true EP0029894A2 (de) | 1981-06-10 |
EP0029894A3 EP0029894A3 (en) | 1981-07-15 |
EP0029894B1 EP0029894B1 (de) | 1985-01-09 |
Family
ID=22276675
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP80106085A Expired EP0029894B1 (de) | 1979-12-03 | 1980-10-07 | System zur sicheren Kennwortverifikation |
Country Status (6)
Country | Link |
---|---|
US (1) | US4295039A (de) |
EP (1) | EP0029894B1 (de) |
JP (1) | JPS5911950B2 (de) |
CA (1) | CA1129028A (de) |
DE (1) | DE3069942D1 (de) |
IT (1) | IT1150969B (de) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2496294A1 (fr) * | 1980-12-15 | 1982-06-18 | Thomson Csf | Dispositif protege d'authentification des utilisateurs d'un terminal de transmission de messages et systeme de transactions comportant de tels dispositifs |
FR2497617A1 (fr) * | 1981-01-07 | 1982-07-09 | Transac Develop Transactions A | Procede et dispositif de securite pour communication tripartie de donnees confidentielles |
EP0086286A1 (de) * | 1982-02-11 | 1983-08-24 | Powell, William S. | Verfahren und Einrichtung zur Übertragung von Daten |
FR2526977A1 (fr) * | 1982-05-14 | 1983-11-18 | Cii Honeywell Bull | Procede et dispositif pour authentifier ou certifier au moins une information contenue dans une memoire d'un support electronique notamment amovible et portatif tel qu'une carte |
FR2530053A1 (fr) * | 1982-07-08 | 1984-01-13 | Cii Honeywell Bull | Procede pour certifier la provenance d'au moins une information enregistree dans une memoire d'un premier dispositif electronique et transmise a un deuxieme dispositif electronique, et systeme pour la mise en oeuvre d'un tel procede |
EP0098437A2 (de) * | 1982-07-09 | 1984-01-18 | Hülsbeck & Fürst GmbH. & Co. KG | Elektronische Schliesseinrichtung mit über elektrische Impulse miteinander in Wechselwirkung tretenden, schlüsselartigen und schlossartigen Teilen |
EP0112944A1 (de) * | 1982-12-30 | 1984-07-11 | International Business Machines Corporation | Prüfen der Gültigkeit von Erkennungskoden |
EP0119707A1 (de) * | 1983-02-22 | 1984-09-26 | BRITISH TELECOMMUNICATIONS public limited company | Automatisches Erkennungssystem |
FR2549989A1 (fr) * | 1983-07-29 | 1985-02-01 | Philips Ind Commerciale | Systeme d'authentification entre un lecteur de carte et une carte de paiement echangeant des informations |
EP0138219A2 (de) * | 1983-10-17 | 1985-04-24 | Kabushiki Kaisha Toshiba | Verfahren zur Speicherung von verschlüsselten Daten auf einer Karte |
EP0147337A2 (de) * | 1983-12-30 | 1985-07-03 | Bull S.A. | Verfahren und System zur vertraulichen Verarbeitung von Daten die auf einer Aufnahmespur mit optischer Ablesung eines Datenträgers aufgezeichnet sind |
FR2583543A1 (fr) * | 1985-06-12 | 1986-12-19 | Lefevre Jean Pierre | Appareil a signer informatique |
US4633037A (en) * | 1983-02-22 | 1986-12-30 | British Telecommunications Public Limited Company | Generation of identification keys |
US4634845A (en) * | 1984-12-24 | 1987-01-06 | Ncr Corporation | Portable personal terminal for use in a system for handling transactions |
US4689478A (en) * | 1984-12-24 | 1987-08-25 | Ncr Corporation | System for handling transactions including a portable personal terminal |
EP0237815A2 (de) * | 1986-02-18 | 1987-09-23 | RMH Systems, Inc. | Autonomes Wertkartensystem und dessen Verfahren |
FR2608800A2 (fr) * | 1985-06-13 | 1988-06-24 | Brechet Michel | Carte electronique de commande codable et auto-validable |
EP0320489A2 (de) * | 1987-12-07 | 1989-06-14 | Automations- Und Informationssysteme Gesellschaft M.B.H. | Verfahren zur Erhöhung der Sicherheit einer IC-Karte und IC-Karte hierzu |
EP0400441A2 (de) * | 1989-05-30 | 1990-12-05 | Siemens Nixdorf Informationssysteme Aktiengesellschaft | Verfahren zur Prüfung eines mit Chipkarten kommunizierenden Terminals |
EP0427465A2 (de) * | 1989-11-09 | 1991-05-15 | AT&T Corp. | Sicherheitssystem ohne Datenbank |
EP0548967A2 (de) * | 1991-12-24 | 1993-06-30 | GAO Gesellschaft für Automation und Organisation mbH | Datenaustauschsystem mit Überprüfung der Vorrichtung auf Authentisierungsstatus |
FR2739737A1 (fr) * | 1995-10-09 | 1997-04-11 | Inside Technologies | Perfectionnements aux cartes a memoire |
EP0829831A1 (de) * | 1996-09-13 | 1998-03-18 | Schlumberger Industries S.A. | Verfahren zum Authentifizieren von Karten |
US5821871A (en) * | 1994-01-27 | 1998-10-13 | Sc-Info+Inno Technologie Informationen+Innovationen Gmbh Cc | Authentication method |
EP1744574A1 (de) * | 2004-07-28 | 2007-01-17 | Huawei Technologies Co., Ltd. | Verfahren zur logischen bindung und verifizierung von geräten in einer vorrichtung |
Families Citing this family (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2469760A1 (fr) * | 1979-11-09 | 1981-05-22 | Cii Honeywell Bull | Procede et systeme d'identification de personnes demandant l'acces a certains milieux |
DE3044984A1 (de) * | 1979-11-30 | 1982-04-15 | Dassault Electronique | Integrierte transistorschaltung, insbesondere fuer codierung |
US4663710A (en) * | 1981-05-15 | 1987-05-05 | The Frymaster Corporation | Intelligent cooking appliance |
CA1176335A (en) * | 1981-06-05 | 1984-10-16 | Exide Electronics Corporation | Computer communications control |
FR2514593B1 (fr) * | 1981-10-09 | 1986-12-26 | Bull Sa | Procede et dispositif pour authentifier la signature d'un message signe |
IL64675A0 (en) * | 1981-12-30 | 1982-03-31 | Greenberg Avigdor | Data verification system |
US4757468A (en) * | 1982-09-22 | 1988-07-12 | Intel Corporation | Authenticated read-only memory |
FR2539897B1 (fr) * | 1983-01-20 | 1988-12-30 | Cii Honeywell Bull | Procede et dispositif pour habiliter le detenteur d'un objet portatif tel qu'une carte, a acceder par cette carte a au moins un service dispense par au moins un organisme habilitant |
JPS59226935A (ja) * | 1983-06-01 | 1984-12-20 | アメリカン・エクスプレス・カンパニ− | 携帯用情報カ−ドの保護装置 |
DE3336717A1 (de) * | 1983-10-08 | 1985-04-25 | Dai Nippon Printing Co., Ltd., Tokio/Tokyo | Verfahren und vorrichtung zur kontaktlosen, elektromagnetischen hin- und rueckuebertragung von steuerbefehlen und daten |
JPS60159992A (ja) * | 1984-01-31 | 1985-08-21 | Toshiba Corp | 取引システム |
US4609777A (en) * | 1984-02-22 | 1986-09-02 | Gordian Systems, Inc. | Solid state key for controlling access to computer software |
US4599489A (en) * | 1984-02-22 | 1986-07-08 | Gordian Systems, Inc. | Solid state key for controlling access to computer software |
US4650975A (en) * | 1984-08-30 | 1987-03-17 | Casio Computer Co., Ltd. | IC card and an identification system thereof |
JPS61143872A (ja) * | 1984-08-30 | 1986-07-01 | Casio Comput Co Ltd | Icカード照合システム |
US4866666A (en) * | 1984-10-29 | 1989-09-12 | Francisco Michael H | Method for maintaining data integrity during information transmission by generating indicia representing total number of binary 1's and 0's of the data |
JPS61109169A (ja) * | 1984-10-31 | 1986-05-27 | エヌ・シー・アール・コーポレーション | Pos端末装置の顧客情報入力システム |
US4694492A (en) * | 1984-11-09 | 1987-09-15 | Pirmasafe, Inc. | Computer communications security control system |
US4691355A (en) * | 1984-11-09 | 1987-09-01 | Pirmasafe, Inc. | Interactive security control system for computer communications and the like |
US4720860A (en) * | 1984-11-30 | 1988-01-19 | Security Dynamics Technologies, Inc. | Method and apparatus for positively identifying an individual |
US5168520A (en) * | 1984-11-30 | 1992-12-01 | Security Dynamics Technologies, Inc. | Method and apparatus for personal identification |
US4998279A (en) * | 1984-11-30 | 1991-03-05 | Weiss Kenneth P | Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics |
US5367572A (en) * | 1984-11-30 | 1994-11-22 | Weiss Kenneth P | Method and apparatus for personal identification |
JPS61195459A (ja) * | 1985-02-26 | 1986-08-29 | Nec Corp | 有料情報受信装置 |
JPS61210488A (ja) * | 1985-03-14 | 1986-09-18 | Toppan Moore Co Ltd | Icカ−ド |
CA1270339A (en) * | 1985-06-24 | 1990-06-12 | Katsuya Nakagawa | System for determining a truth of software in an information processing apparatus |
JPH074449B2 (ja) * | 1985-10-04 | 1995-01-25 | 任天堂株式会社 | ゲ−ム機用カ−トリツジとそれを用いるゲ−ム機 |
USRE34161E (en) * | 1985-10-04 | 1993-01-12 | Nintendo Company Limited | Memory cartridge and information processor unit using such cartridge |
US4799061A (en) * | 1985-11-18 | 1989-01-17 | International Business Machines Corporation | Secure component authentication system |
USRE38419E1 (en) | 1986-05-13 | 2004-02-10 | Ncr Corporation | Computer interface device |
FR2601795B1 (fr) * | 1986-07-17 | 1988-10-07 | Bull Cp8 | Procede pour diversifier une cle de base et pour authentifier une cle ainsi diversifiee comme ayant ete elaboree a partir d'une cle de base predeterminee, et systeme pour la mise en oeuvre |
EP0619563B1 (de) * | 1986-09-02 | 1999-01-07 | Pitney Bowes, Inc. | Transaktionssystem mit modularem Drucker |
GB8621333D0 (en) * | 1986-09-04 | 1986-10-15 | Manitoba Telephone System | Key management system |
US4969188A (en) * | 1987-02-17 | 1990-11-06 | Gretag Aktiengesellschaft | Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management |
ES2041712T3 (es) * | 1987-03-04 | 1993-12-01 | Siemens Nixdorf Informationssysteme Ag | Sistema de intercambio de datos. |
ES2046222T3 (es) * | 1987-03-04 | 1994-02-01 | Siemens Nixdorf Informationssysteme Ag | Sistema de intercambio de datos con varios terminales de usuario que contienen, respectivamente, una instalacion de lectura de tarjetas de chips. |
JP2629184B2 (ja) * | 1987-04-21 | 1997-07-09 | カシオ計算機株式会社 | Icカード認証システム |
US5140634A (en) * | 1987-09-07 | 1992-08-18 | U.S Philips Corporation | Method and apparatus for authenticating accreditations and for authenticating and signing messages |
US4964163A (en) * | 1988-04-04 | 1990-10-16 | Motorola, Inc. | Method and apparatus for controlling access to a communication system |
US4992783A (en) * | 1988-04-04 | 1991-02-12 | Motorola, Inc. | Method and apparatus for controlling access to a communication system |
US4935961A (en) * | 1988-07-27 | 1990-06-19 | Gargiulo Joseph L | Method and apparatus for the generation and synchronization of cryptographic keys |
US5007085A (en) * | 1988-10-28 | 1991-04-09 | International Business Machines Corporation | Remotely sensed personal stylus |
FR2651347A1 (fr) * | 1989-08-22 | 1991-03-01 | Trt Telecom Radio Electr | Procede de generation de nombre unique pour carte a microcircuit et application a la cooperation de la carte avec un systeme hote. |
US6926200B1 (en) | 1989-09-06 | 2005-08-09 | Fujitsu Limited | Electronic cashless system |
US6003767A (en) * | 1989-09-06 | 1999-12-21 | Fujitsu Limited | Cashless medium for an electronic cashless system |
US6003762A (en) * | 1989-09-06 | 1999-12-21 | Fujitsu Limited | Transaction terminal for an electronic cashless system |
US5130519A (en) * | 1990-01-16 | 1992-07-14 | George Bush | Portable pin card |
US5263164A (en) * | 1991-01-09 | 1993-11-16 | Verifone, Inc. | Method and structure for determining transaction system hardware and software configurations |
US5237614A (en) * | 1991-06-07 | 1993-08-17 | Security Dynamics Technologies, Inc. | Integrated network security system |
US5313639A (en) * | 1992-06-26 | 1994-05-17 | George Chao | Computer with security device for controlling access thereto |
US5361062A (en) * | 1992-11-25 | 1994-11-01 | Security Dynamics Technologies, Inc. | Personal security system |
DE4339460C1 (de) * | 1993-11-19 | 1995-04-06 | Siemens Ag | Verfahren zur Authentifizierung eines Systemteils durch ein anderes Systemteil eines Informationsübertragungssystems nach dem Challenge-and Response-Prinzip |
US5627355A (en) * | 1994-07-13 | 1997-05-06 | Rahman; Sam | Transaction device, equipment and method for protecting account numbers and their associated personal identification numbers |
US5478994A (en) * | 1994-07-13 | 1995-12-26 | Rahman; Sam | Secure credit card which prevents unauthorized transactions |
US5587575A (en) * | 1994-08-11 | 1996-12-24 | Spescom (Proprietary) Limited | Identification of vehicles including code comparison |
EP0717337B1 (de) * | 1994-12-13 | 2001-08-01 | International Business Machines Corporation | Verfahren und System zur gesicherten Programmenverteilung |
US5682428A (en) * | 1995-02-13 | 1997-10-28 | Eta Technologies Corporation | Personal access management system |
US5610980A (en) * | 1995-02-13 | 1997-03-11 | Eta Technologies Corporation | Method and apparatus for re-initializing a processing device and a storage device |
US5778068A (en) * | 1995-02-13 | 1998-07-07 | Eta Technologies Corporation | Personal access management system |
US5696825A (en) * | 1995-02-13 | 1997-12-09 | Eta Technologies Corporation | Personal access management system |
US5692049A (en) * | 1995-02-13 | 1997-11-25 | Eta Technologies Corporation | Personal access management system |
US5694472A (en) * | 1995-02-13 | 1997-12-02 | Eta Technologies Corporation | Personal access management system |
US5689564A (en) * | 1995-02-13 | 1997-11-18 | Eta Technologies Corporation | Personal access management system |
US5619574A (en) * | 1995-02-13 | 1997-04-08 | Eta Technologies Corporation | Personal access management system |
NL1000352C2 (nl) * | 1995-05-12 | 1996-11-13 | Nederland Ptt | Elektronisch betaalsysteem met verschillende rekeneenheden, elektronisch betaalmiddel alsmede werkwijze voor elektronisch betalen. |
US6071191A (en) * | 1995-11-22 | 2000-06-06 | Nintendo Co., Ltd. | Systems and methods for providing security in a video game system |
US6190257B1 (en) | 1995-11-22 | 2001-02-20 | Nintendo Co., Ltd. | Systems and method for providing security in a video game system |
JP2744216B2 (ja) * | 1996-01-08 | 1998-04-28 | 株式会社東芝 | Icカード |
WO1997041499A2 (en) * | 1996-04-15 | 1997-11-06 | Martinez Jerry R | Method and apparatus for validating credit information during home delivery of order |
US20030195846A1 (en) | 1996-06-05 | 2003-10-16 | David Felger | Method of billing a purchase made over a computer network |
US8229844B2 (en) | 1996-06-05 | 2012-07-24 | Fraud Control Systems.Com Corporation | Method of billing a purchase made over a computer network |
US7555458B1 (en) | 1996-06-05 | 2009-06-30 | Fraud Control System.Com Corporation | Method of billing a purchase made over a computer network |
US6367017B1 (en) | 1996-11-07 | 2002-04-02 | Litronic Inc. | Apparatus and method for providing and authentication system |
US6268788B1 (en) | 1996-11-07 | 2001-07-31 | Litronic Inc. | Apparatus and method for providing an authentication system based on biometrics |
US5844497A (en) * | 1996-11-07 | 1998-12-01 | Litronic, Inc. | Apparatus and method for providing an authentication system |
FR2755809B1 (fr) * | 1996-11-13 | 1999-05-28 | Thomson Multimedia Sa | Procede de protection d'information transmise d'un element de securite vers un decodeur et systeme de protection utilisant un tel procede |
US6075860A (en) * | 1997-02-19 | 2000-06-13 | 3Com Corporation | Apparatus and method for authentication and encryption of a remote terminal over a wireless link |
JP4006796B2 (ja) | 1997-11-17 | 2007-11-14 | 株式会社日立製作所 | 個人情報管理方法および装置 |
FI20000194A0 (fi) * | 2000-01-31 | 2000-01-31 | Jarkko Valtanen | Menetelmä kaupankäynnissä |
DE60133453T2 (de) * | 2000-02-18 | 2009-05-07 | Cypak Ab | Verfahren und vorrichtung zur identifizierung und authentisierung |
US7222359B2 (en) * | 2001-07-27 | 2007-05-22 | Check Point Software Technologies, Inc. | System methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices |
JP2003087238A (ja) * | 2001-09-11 | 2003-03-20 | Hitachi Ltd | 家庭内ネットワークにおけるセキュリティ実現方式 |
US8914310B2 (en) * | 2009-01-29 | 2014-12-16 | A Major Difference, Inc. | Multi-functional control unit for an ionic foot bath system |
US20110054572A1 (en) * | 2009-07-29 | 2011-03-03 | A Major Difference, Inc. | Therapeutic electrolysis device with replaceable ionizer unit |
US20110189600A1 (en) * | 2010-01-29 | 2011-08-04 | Lars Plumer | Method for automated control of processing parameters |
US20110189611A1 (en) * | 2010-01-29 | 2011-08-04 | Lars Plumer | Plate recognition system for automated control of processing parameters |
US20110188066A1 (en) * | 2010-01-29 | 2011-08-04 | Lars Plumer | Processor system with provision for automated control of processing parameters |
US10694352B2 (en) | 2015-10-28 | 2020-06-23 | Activision Publishing, Inc. | System and method of using physical objects to control software access |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3764742A (en) * | 1971-12-23 | 1973-10-09 | Ibm | Cryptographic identification system |
US3806874A (en) * | 1972-04-11 | 1974-04-23 | Gretag Ag | Identification system for individuals |
CH604285A5 (de) * | 1977-03-04 | 1978-09-15 | Landis & Gyr Ag | |
FR2383485A1 (fr) * | 1977-03-11 | 1978-10-06 | Diebold Inc | Systeme de verification, directement connecte pour carte d'identification ou similaire |
FR2394131A1 (fr) * | 1977-06-07 | 1979-01-05 | Cii Honeywell Bull | Systeme de traitement d'informations protegeant le secret d'informations confidentielles |
GB2011671A (en) * | 1977-12-30 | 1979-07-11 | Ibm | Terminal device |
FR2415340A1 (fr) * | 1978-01-19 | 1979-08-17 | Datasaab Ab | Systeme d'identification personnelle |
FR2417141A1 (fr) * | 1978-02-09 | 1979-09-07 | Travaux Indls Pour Electricite | Systeme de controle par reconnaissance automatique d'un objet marque |
GB2020074A (en) * | 1978-04-26 | 1979-11-07 | Omron Tateisi Electronics Co | Card vertification system using stored functions |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3594727A (en) * | 1968-04-16 | 1971-07-20 | Edward L Braun | Credit card banking system |
US3906460A (en) * | 1973-01-11 | 1975-09-16 | Halpern John Wolfgang | Proximity data transfer system with tamper proof portable data token |
FR2304965A2 (fr) * | 1974-03-25 | 1976-10-15 | Innovation Ste Int | Procede et dispositif de commande electronique |
US3971916A (en) * | 1974-03-25 | 1976-07-27 | Societe Internationale | Methods of data storage and data storage systems |
US3978320A (en) * | 1975-02-20 | 1976-08-31 | Mcbride Jr W Neil | Data control devices |
US4023013A (en) * | 1975-12-29 | 1977-05-10 | Diebold, Incorporated | On-line verification system for identification card or the like |
US4123747A (en) * | 1977-05-20 | 1978-10-31 | International Business Machines Corporation | Identity verification method and apparatus |
US4234932A (en) * | 1978-09-05 | 1980-11-18 | Honeywell Information Systems Inc. | Security system for remote cash dispensers |
-
1979
- 1979-12-03 US US06/099,797 patent/US4295039A/en not_active Expired - Lifetime
-
1980
- 1980-09-19 JP JP55129395A patent/JPS5911950B2/ja not_active Expired
- 1980-10-07 DE DE8080106085T patent/DE3069942D1/de not_active Expired
- 1980-10-07 EP EP80106085A patent/EP0029894B1/de not_active Expired
- 1980-10-14 IT IT25313/80A patent/IT1150969B/it active
- 1980-10-16 CA CA362,549A patent/CA1129028A/en not_active Expired
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3764742A (en) * | 1971-12-23 | 1973-10-09 | Ibm | Cryptographic identification system |
US3806874A (en) * | 1972-04-11 | 1974-04-23 | Gretag Ag | Identification system for individuals |
CH604285A5 (de) * | 1977-03-04 | 1978-09-15 | Landis & Gyr Ag | |
FR2383485A1 (fr) * | 1977-03-11 | 1978-10-06 | Diebold Inc | Systeme de verification, directement connecte pour carte d'identification ou similaire |
FR2394131A1 (fr) * | 1977-06-07 | 1979-01-05 | Cii Honeywell Bull | Systeme de traitement d'informations protegeant le secret d'informations confidentielles |
GB2011671A (en) * | 1977-12-30 | 1979-07-11 | Ibm | Terminal device |
FR2415340A1 (fr) * | 1978-01-19 | 1979-08-17 | Datasaab Ab | Systeme d'identification personnelle |
FR2417141A1 (fr) * | 1978-02-09 | 1979-09-07 | Travaux Indls Pour Electricite | Systeme de controle par reconnaissance automatique d'un objet marque |
GB2020074A (en) * | 1978-04-26 | 1979-11-07 | Omron Tateisi Electronics Co | Card vertification system using stored functions |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2496294A1 (fr) * | 1980-12-15 | 1982-06-18 | Thomson Csf | Dispositif protege d'authentification des utilisateurs d'un terminal de transmission de messages et systeme de transactions comportant de tels dispositifs |
FR2497617A1 (fr) * | 1981-01-07 | 1982-07-09 | Transac Develop Transactions A | Procede et dispositif de securite pour communication tripartie de donnees confidentielles |
EP0055986A2 (de) * | 1981-01-07 | 1982-07-14 | Bull Transac | Sicherheitsverfahren und -vorrichtung zur Dreieckkommunikation von vertraulichen Daten |
WO1982002446A1 (en) * | 1981-01-07 | 1982-07-22 | Decavele Dominique | Security method and device for three-party communication of confidential data |
EP0055986A3 (en) * | 1981-01-07 | 1982-08-04 | Transac - Alcatel - Compagnie Pour Le Developpement Des Transactions Automatiques, Societe Anonyme Dite: | Security system and apparatus for the three-way communication of confidential data |
US4498000A (en) * | 1981-01-07 | 1985-02-05 | Transac-Alcatel | Security method and device for communicating confidential data via an intermediate stage |
EP0086286A1 (de) * | 1982-02-11 | 1983-08-24 | Powell, William S. | Verfahren und Einrichtung zur Übertragung von Daten |
FR2526977A1 (fr) * | 1982-05-14 | 1983-11-18 | Cii Honeywell Bull | Procede et dispositif pour authentifier ou certifier au moins une information contenue dans une memoire d'un support electronique notamment amovible et portatif tel qu'une carte |
EP0096599A1 (de) * | 1982-05-14 | 1983-12-21 | Cii Honeywell Bull | Verfahren zum Beglaubigen oder Bescheinigen mindestens eines Datensatzes eines Speichers in einem elektronischen Träger, insbesondere abnehmbar und tragbar, wie eine Karte |
US4544833A (en) * | 1982-05-14 | 1985-10-01 | Cii Honeywell Bull (Societe Anonyme) | Process and apparatus for authenticating or certifying at least one item of information contained in a memory of a removable and portable electronic carrier, such as a card |
FR2530053A1 (fr) * | 1982-07-08 | 1984-01-13 | Cii Honeywell Bull | Procede pour certifier la provenance d'au moins une information enregistree dans une memoire d'un premier dispositif electronique et transmise a un deuxieme dispositif electronique, et systeme pour la mise en oeuvre d'un tel procede |
EP0100260A1 (de) * | 1982-07-08 | 1984-02-08 | Bull S.A. | Verfahren zum Nachweis der Herkunft von mindestens einer in einem ersten elektronischen Gerät gespeicherten Information und Übertragung dieser in ein zweites elektronisches Gerät |
EP0098437A2 (de) * | 1982-07-09 | 1984-01-18 | Hülsbeck & Fürst GmbH. & Co. KG | Elektronische Schliesseinrichtung mit über elektrische Impulse miteinander in Wechselwirkung tretenden, schlüsselartigen und schlossartigen Teilen |
EP0098437A3 (en) * | 1982-07-09 | 1985-01-23 | Hulsbeck & Furst Gmbh. & Co. Kg | Electronic locking device with key and lock parts interacting by means of electric pulses |
EP0112944A1 (de) * | 1982-12-30 | 1984-07-11 | International Business Machines Corporation | Prüfen der Gültigkeit von Erkennungskoden |
EP0119707A1 (de) * | 1983-02-22 | 1984-09-26 | BRITISH TELECOMMUNICATIONS public limited company | Automatisches Erkennungssystem |
US4633037A (en) * | 1983-02-22 | 1986-12-30 | British Telecommunications Public Limited Company | Generation of identification keys |
FR2549989A1 (fr) * | 1983-07-29 | 1985-02-01 | Philips Ind Commerciale | Systeme d'authentification entre un lecteur de carte et une carte de paiement echangeant des informations |
EP0138219A2 (de) * | 1983-10-17 | 1985-04-24 | Kabushiki Kaisha Toshiba | Verfahren zur Speicherung von verschlüsselten Daten auf einer Karte |
EP0138219A3 (en) * | 1983-10-17 | 1985-06-05 | Kabushiki Kaisha Toshiba | Memory card |
US4672182A (en) * | 1983-10-17 | 1987-06-09 | Kabushiki Kaisha Toshiba | Memory card |
EP0147337A2 (de) * | 1983-12-30 | 1985-07-03 | Bull S.A. | Verfahren und System zur vertraulichen Verarbeitung von Daten die auf einer Aufnahmespur mit optischer Ablesung eines Datenträgers aufgezeichnet sind |
FR2557715A1 (fr) * | 1983-12-30 | 1985-07-05 | Cii Honeywell Bull | Procede et systeme pour traiter de facon confidentielle des informations stockees sur une piste d'enregistrement a lecture optique d'un support portatif |
EP0147337A3 (en) * | 1983-12-30 | 1985-08-14 | Cii Honeywell Bull | Method and system for confidentially processing information registered on a portable carrier recording track with optical reading |
US4634845A (en) * | 1984-12-24 | 1987-01-06 | Ncr Corporation | Portable personal terminal for use in a system for handling transactions |
US4689478A (en) * | 1984-12-24 | 1987-08-25 | Ncr Corporation | System for handling transactions including a portable personal terminal |
FR2583543A1 (fr) * | 1985-06-12 | 1986-12-19 | Lefevre Jean Pierre | Appareil a signer informatique |
FR2608800A2 (fr) * | 1985-06-13 | 1988-06-24 | Brechet Michel | Carte electronique de commande codable et auto-validable |
EP0237815A2 (de) * | 1986-02-18 | 1987-09-23 | RMH Systems, Inc. | Autonomes Wertkartensystem und dessen Verfahren |
EP0237815A3 (en) * | 1986-02-18 | 1989-08-02 | Rmh Systems, Inc. | Off line cash card system and method |
EP0320489A2 (de) * | 1987-12-07 | 1989-06-14 | Automations- Und Informationssysteme Gesellschaft M.B.H. | Verfahren zur Erhöhung der Sicherheit einer IC-Karte und IC-Karte hierzu |
EP0320489A3 (en) * | 1987-12-07 | 1990-03-28 | Automations & Informat Systeme | Method to increase ic-card security, and ic-card making use of this method |
EP0400441A3 (de) * | 1989-05-30 | 1991-09-04 | Siemens Nixdorf Informationssysteme Aktiengesellschaft | Verfahren zur Prüfung eines mit Chipkarten kommunizierenden Terminals |
EP0400441A2 (de) * | 1989-05-30 | 1990-12-05 | Siemens Nixdorf Informationssysteme Aktiengesellschaft | Verfahren zur Prüfung eines mit Chipkarten kommunizierenden Terminals |
US5208447A (en) * | 1989-05-30 | 1993-05-04 | Siemens Aktiengesellschaft | Method for testing a terminal communicating with chip cards |
EP0427465A3 (en) * | 1989-11-09 | 1991-07-24 | American Telephone And Telegraph Company | Databaseless security system |
EP0427465A2 (de) * | 1989-11-09 | 1991-05-15 | AT&T Corp. | Sicherheitssystem ohne Datenbank |
EP0548967A2 (de) * | 1991-12-24 | 1993-06-30 | GAO Gesellschaft für Automation und Organisation mbH | Datenaustauschsystem mit Überprüfung der Vorrichtung auf Authentisierungsstatus |
EP0548967A3 (en) * | 1991-12-24 | 1996-01-31 | Gao Ges Automation Org | Data exchange system with authentification status check |
US5821871A (en) * | 1994-01-27 | 1998-10-13 | Sc-Info+Inno Technologie Informationen+Innovationen Gmbh Cc | Authentication method |
FR2739737A1 (fr) * | 1995-10-09 | 1997-04-11 | Inside Technologies | Perfectionnements aux cartes a memoire |
WO1997014119A1 (fr) * | 1995-10-09 | 1997-04-17 | Inside Technologies | Procede d'authentification pour microcircuit a logique cablee |
US6152367A (en) * | 1995-10-09 | 2000-11-28 | Inside Technologies | Wired logic microcircuit and authentication method having protection against fraudulent detection of a user secret code during authentication |
EP0829831A1 (de) * | 1996-09-13 | 1998-03-18 | Schlumberger Industries S.A. | Verfahren zum Authentifizieren von Karten |
FR2753556A1 (fr) * | 1996-09-13 | 1998-03-20 | Schlumberger Ind Sa | Methode d'authentification de cartes |
EP1744574A1 (de) * | 2004-07-28 | 2007-01-17 | Huawei Technologies Co., Ltd. | Verfahren zur logischen bindung und verifizierung von geräten in einer vorrichtung |
EP1744574A4 (de) * | 2004-07-28 | 2007-05-16 | Huawei Tech Co Ltd | Verfahren zur logischen bindung und verifizierung von geräten in einer vorrichtung |
US7634658B2 (en) | 2004-07-28 | 2009-12-15 | Huawei Technologies Co., Ltd. | Method for logically binding and verifying a subassembly in equipment |
Also Published As
Publication number | Publication date |
---|---|
JPS5680769A (en) | 1981-07-02 |
DE3069942D1 (en) | 1985-02-21 |
CA1129028A (en) | 1982-08-03 |
EP0029894A3 (en) | 1981-07-15 |
EP0029894B1 (de) | 1985-01-09 |
JPS5911950B2 (ja) | 1984-03-19 |
IT8025313A0 (it) | 1980-10-14 |
IT1150969B (it) | 1986-12-17 |
US4295039A (en) | 1981-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0029894B1 (de) | System zur sicheren Kennwortverifikation | |
US4386266A (en) | Method for operating a transaction execution system having improved verification of personal identification | |
US4259720A (en) | Security system for electronic funds transfer system | |
US4408203A (en) | Security system for electronic funds transfer system | |
US4357529A (en) | Multilevel security apparatus and method | |
EP0032193B1 (de) | Kommunikationsgerät | |
US4328414A (en) | Multilevel security apparatus and method | |
US4890323A (en) | Data communication systems and methods | |
US5193114A (en) | Consumer oriented smart card system and authentication techniques | |
US5485519A (en) | Enhanced security for a secure token code | |
US4304990A (en) | Multilevel security apparatus and method | |
EP0385400B1 (de) | Mehrebenen-Sicherheitsvorrichtung und -verfahren mit persönlichem Schlüssel | |
EP0007002B1 (de) | Transaktionsterminalsysteme mit Beglaubigung des potentiellen Benutzers | |
CA1104256A (en) | Identity verification method and apparatus | |
US5513261A (en) | Key management scheme for use with electronic cards | |
US4529870A (en) | Cryptographic identification, financial transaction, and credential device | |
US4498000A (en) | Security method and device for communicating confidential data via an intermediate stage | |
JPS645783B2 (de) | ||
AU626331B2 (en) | System for collating personal identification number | |
JPS61139878A (ja) | 電子資金転送装置の安全保護モジユ−ル | |
US20060157553A1 (en) | Accommodating multiple users of a secure credit card | |
JPH06501324A (ja) | スマートカード妥当性検証装置および方法 | |
KR20010108292A (ko) | 휴대용 전자식 과금 및 인증 장치와 그 방법 | |
JPS62189593A (ja) | Icカ−ド利用システム | |
JPS6133574A (ja) | 物の電子的に正当と認定される確認方法および装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Designated state(s): DE FR GB |
|
AK | Designated contracting states |
Designated state(s): DE FR GB |
|
17P | Request for examination filed |
Effective date: 19811216 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Designated state(s): DE FR GB |
|
REF | Corresponds to: |
Ref document number: 3069942 Country of ref document: DE Date of ref document: 19850221 |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed | ||
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 19940930 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 19941026 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 19951018 Year of fee payment: 16 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Effective date: 19960628 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Effective date: 19960702 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Effective date: 19961007 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 19961007 |